Ethernet: Introduction To Networks v6.0
Ethernet: Introduction To Networks v6.0
Ethernet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 5 - Sections & Objectives
5.1 Ethernet Protocol
• Explain how the Ethernet sublayers are related to the frame fields.
• Describe the Ethernet MAC address.
5.2 LAN Switches
• Explain how a switch operates.
• Explain how a switch builds its MAC address table and forwards frames.
• Describe switch forwarding methods.
• Describe the types of port settings available for Layer 2 switches.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Ethernet Protocol
Ethernet Frame
Ethernet Encapsulation
• Ethernet operates in the data link layer and the physical layer.
• Ethernet supports data bandwidths from 10Mbps through
100Gbps.
• Ethernet standards define both the Layer 2 protocols and the
Layer 1 technologies.
MAC Sublayer
• MAC constitutes the lower sublayer of the data link layer.
• Responsible for Data encapsulation and Media access control.
Ethernet Evolution
• Ethernet has been evolving since its creation in 1973.
• The Ethernet frame structure adds headers and trailers around the
Layer 3 PDU to encapsulate the message being sent.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Ethernet Protocol
Ethernet Frame (Cont.)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Ethernet Protocol
Ethernet MAC Addresses
MAC Addresses and Hexadecimal
• MAC address is 48-bit long and expressed as 12
hexadecimal digits.
Frame Processing
• The NIC compares the destination MAC address in the
frame with the device’s physical MAC address stored in
RAM.
• If there is a match, the framed is passed up the OSI
layers.
• If there is no match, the device discards the frame.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Ethernet Protocol
Ethernet MAC Addresses (Cont.)
Unicast MAC Address
• Unique address used when a frame is sent from a single transmitting device to a single
destination device.
• The source MAC address must always be a unicast.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Ethernet Protocol
Ethernet MAC Addresses (Cont.)
Broadcast MAC Address
• Used to address all nodes in the segment.
• The destination MAC address is the address of FF-FF-FF-FF-FF-FF in hexadecimal (48
ones in binary).
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Ethernet Protocol
Ethernet MAC Addresses (Cont.)
Multicast MAC Address
• Used to address a group of nodes in the segment.
• The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal.
• The remaining portion of the multicast MAC address is created by converting the lower 23 bits of the IP
multicast group address into 6 hexadecimal characters.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
LAN Switches
The MAC Address Table
Switch Fundamentals
• An Ethernet Switch is a Layer 2 device.
• It uses MAC addresses to make forwarding decisions.
• The MAC address table is sometimes referred to as a content addressable
memory (CAM) table.
Filtering Frames
• Since the switch knows where to find a specific MAC address, it can filter the
frames to that port only.
• Filtering is not done is the destination MAC is not present in the CAM.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
LAN Switches
The MAC Address Table
As a switch receives
frames from different
devices, it is able to
populate its MAC address
table by examining the
source MAC address of
every frame.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Frame Forwarding
Switch Forwarding Methods
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
LAN Switches
Switch Forwarding Methods
Memory Buffering on Switches
• Port-based memory & Share memory
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
LAN Switches
Switch Port Settings
Duplex and Speed Settings
• Full-duplex – Both ends of the
connection can send and receive
simultaneously.
• Half-duplex – Only one end of the
connection can send at a time.
• A common cause of performance
issues on Ethernet links is when one
port on the link operates at half-
duplex and the other on full-duplex.
Auto-MDX
• Detects the type of connection required
and configures the interface accordingly.
• Helps reducing configuration errors.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Address Resolution Protocol
MAC and IP
The combination of MAC and IP
facilitate the End-to-End
communication.
Layer 2 addresses are used to move
the frame within the local network
Layer 3 addresses are used to move
the packets through remote
networks.
Destination on Same Network
• Physical address (MAC address) is used for
Ethernet NIC to Ethernet NIC
communications on the same network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Address Resolution Protocol
ARP
Introduction to ARP
• ARP allows the source to request the MAC address
of the destination.
• The request is based upon the layer 3 address of the
destination (known by the source).
ARP Functions
• Resolving IPv4 addresses to MAC addresses
• Maintaining a table of mappings
• ARP uses ARP Request and ARP Reply to perform
its functions.
ARP Tables
• On IOS: show ip arp
• On Windows PCs: arp -a
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Address Resolution Protocol
ARP Issues
ARP Broadcasts
• ARP requests can flood the local
segment.
ARP Spoofing
• Attackers can respond to
requests and pretend to be
providers of services. Example:
default gateway
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
TAREA
• Realice las actividades propuestas por los temas
tratados
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17